WordPress <= 4.2 - Stored XSS

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

<p>Confirmed vulnerable: WordPress 4.2, 4.1.2, 4.1.1, 3.9.3. </p><p>Tested with MySQL versions 5.1.53 and 5.5.41.</p><p><br></p><p>## Overview</p><p>Current versions of WordPress are vulnerable to a stored XSS.&nbsp; An unauthenticated attacker can inject JavaScript in </p><p>WordPress comments. The script is triggered when the comment is viewed.</p><p>&nbsp;</p><p>If triggered by a logged-in administrator, under default settings the attacker can leverage the vulnerability to </p><p>execute arbitrary code on the server via the plugin and theme editors.</p><p>&nbsp;</p><p>Alternatively the attacker could change the administrator’s password, create new administrator accounts, </p><p>or do whatever else the currently logged-in administrator can do on the target system.</p><p>&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p>## Details</p><p>If the comment text is long enough, it will be truncated when inserted in the database. </p><p>The MySQL TEXT type size limit is 64 kilobytes, so the comment...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息